General
-
Target
2025-02-03_affdf360523ad2f4c442fca33b199f7c_avoslocker_floxif_luca-stealer_revil
-
Size
4.8MB
-
Sample
250203-pm8e6s1kgt
-
MD5
affdf360523ad2f4c442fca33b199f7c
-
SHA1
2f381a3d298e4a2575f0bfe59b6582910f62836a
-
SHA256
97d6b83719e98821fdd77fd4dd9ff2f5571e7afbd468618e12ca6d06e8f4ddde
-
SHA512
9cd263e9fd2eda4877151cb194feef7ce25316c033122e2c0d1feec7b6e35fde4d234acfa6745dc2380d600739f40a4b5ec9cfb8587526185083c7069ebcdd1e
-
SSDEEP
98304:PMQCT6utaSLRxTtNrKb8GvgwRC6WHYmS2Z7Rrw9Z5We3sgCb38z2Xo09/I:P+JtaSLRNtNK9vgwRCVZrwP/cb4ooGA
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-03_affdf360523ad2f4c442fca33b199f7c_avoslocker_floxif_luca-stealer_revil.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2025-02-03_affdf360523ad2f4c442fca33b199f7c_avoslocker_floxif_luca-stealer_revil
-
Size
4.8MB
-
MD5
affdf360523ad2f4c442fca33b199f7c
-
SHA1
2f381a3d298e4a2575f0bfe59b6582910f62836a
-
SHA256
97d6b83719e98821fdd77fd4dd9ff2f5571e7afbd468618e12ca6d06e8f4ddde
-
SHA512
9cd263e9fd2eda4877151cb194feef7ce25316c033122e2c0d1feec7b6e35fde4d234acfa6745dc2380d600739f40a4b5ec9cfb8587526185083c7069ebcdd1e
-
SSDEEP
98304:PMQCT6utaSLRxTtNrKb8GvgwRC6WHYmS2Z7Rrw9Z5We3sgCb38z2Xo09/I:P+JtaSLRNtNK9vgwRCVZrwP/cb4ooGA
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1